Static task
static1
Behavioral task
behavioral1
Sample
c4b0ccc8d3853ae6198241fa7997f7973a137132c623f68ee927b9ba12997d82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4b0ccc8d3853ae6198241fa7997f7973a137132c623f68ee927b9ba12997d82.exe
Resource
win10v2004-20220812-en
General
-
Target
c4b0ccc8d3853ae6198241fa7997f7973a137132c623f68ee927b9ba12997d82
-
Size
316KB
-
MD5
d03710208840af668028f852e22551c9
-
SHA1
5257fb6f4e0b76ed43d3b91c9b98f282aa49731e
-
SHA256
c4b0ccc8d3853ae6198241fa7997f7973a137132c623f68ee927b9ba12997d82
-
SHA512
1cf68a23165c5c88eab61a5e60f696789ed659b0077999d27c021b420770507413a720d217aa33edc674e31a20d00934e1afcbdc5530515e8ae17c3f78d2099a
-
SSDEEP
6144:OtlbTD/iKJprwBWQnDJAY58aBoCUljxLpWPWLQuJMm6tDnV:aT+KJFwBWQnDJAY5NB6NxLkPWLQu3orV
Malware Config
Signatures
Files
-
c4b0ccc8d3853ae6198241fa7997f7973a137132c623f68ee927b9ba12997d82.exe windows x86
f70be3dac3aa08fb1e9ecb1827655ca9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetConnectedState
InternetAttemptConnect
InternetConnectA
InternetOpenA
HttpSendRequestA
InternetCloseHandle
HttpOpenRequestA
urlmon
URLDownloadToFileA
kernel32
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapFree
GetProcessHeap
lstrcmpiA
lstrlenW
lstrlenA
GetModuleFileNameA
WriteFile
SetFilePointer
GetFileSize
SetFileAttributesA
WriteProcessMemory
ReadProcessMemory
OpenProcess
GetCurrentProcessId
GetVolumeInformationA
ReadFile
CreateThread
TerminateProcess
GetExitCodeProcess
FreeLibrary
GetProcAddress
LoadLibraryA
SuspendThread
ResumeThread
CreateProcessA
SetCurrentDirectoryA
ExitProcess
CopyFileA
CompareStringA
CompareStringW
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
GetModuleHandleA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
GetCurrentThreadId
CreateDirectoryA
GetTempPathA
SetFileTime
WideCharToMultiByte
FindClose
FindFirstFileA
SetEndOfFile
WaitForSingleObject
SetEvent
CreateEventA
GetFullPathNameA
RemoveDirectoryA
FindNextFileA
GetTickCount
GetFileAttributesA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
HeapDestroy
LCMapStringW
LCMapStringA
HeapSize
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
HeapReAlloc
GetDateFormatA
GetTimeFormatA
VirtualQuery
HeapCreate
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
GetSystemTimeAsFileTime
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateFileA
Sleep
DeleteFileA
CloseHandle
InterlockedDecrement
InterlockedIncrement
GetFileType
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SystemTimeToFileTime
SetEnvironmentVariableA
user32
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
IsWindow
SendMessageA
DestroyAcceleratorTable
GetFocus
CreateWindowExA
LoadCursorA
GetClassInfoExA
IsChild
GetWindow
SetFocus
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
RegisterClassExA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
RegisterWindowMessageA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
PostMessageA
SystemParametersInfoA
GetDlgItem
MoveWindow
GetKeyState
DefWindowProcA
SetTimer
KillTimer
MessageBoxA
WaitForInputIdle
EnumThreadWindows
ShowWindow
GetWindowRect
GetSystemMetrics
GetDC
ReleaseDC
GetWindowPlacement
IsWindowVisible
SetWindowPlacement
GetWindowLongA
SetWindowLongA
wsprintfA
UnregisterClassA
gdi32
CreateSolidBrush
GetStockObject
GetObjectA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
GetDeviceCaps
DeleteObject
comdlg32
GetOpenFileNameA
advapi32
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegDeleteKeyA
shell32
SHGetSpecialFolderPathA
ExtractIconExA
ole32
CoGetClassObject
OleInitialize
CoCreateInstance
CoTaskMemAlloc
OleLockRunning
CreateStreamOnHGlobal
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoTaskMemRealloc
OleUninitialize
StringFromGUID2
oleaut32
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
Sections
.text Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ